EP1544790B1 - Method and system for generating characterizing information descriptive of a selected text block - Google Patents
Method and system for generating characterizing information descriptive of a selected text block Download PDFInfo
- Publication number
- EP1544790B1 EP1544790B1 EP04029701A EP04029701A EP1544790B1 EP 1544790 B1 EP1544790 B1 EP 1544790B1 EP 04029701 A EP04029701 A EP 04029701A EP 04029701 A EP04029701 A EP 04029701A EP 1544790 B1 EP1544790 B1 EP 1544790B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- descriptors
- image
- characterizing
- algorithms
- block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
Definitions
- the subject invention relates to the problem of providing a robust, compact characterization of a block of printed text which will distinguish the selected block of text from other such blocks. More particularly, it relates to the problem of providing an image-based characterization of a printed address block which can be incorporated into a digital postal indicium. (By "robust and compact” herein is meant information which is small enough in quantity to be incorporated into postal indicia yet will identify a text block, and distinguish it from other text blocks, with sufficient reliability to deter “rubber stamp” counterfeiting; despite errors introduced by the printing and/or scanning processes.)
- Postage metering systems account for postage and other values such as parcel delivery service charges and tax stamps, and print indicia representative of such values as proof of payment. To protect against counterfeiting of indicia, modern digital postage metering systems use encryption technology.
- the postage value and other information relating to an indicium preferably, are digitally signed or otherwise cryptographically authenticated, and the information and signature are incorporated into the digital postal indicium.
- Digital postal indicia using encryption technologies are extremely secure. In general, without knowledge of the proper encryption keys, it is essentially impossible to produce a counterfeit digital indicium, However, digital indicia are subject, as are all postal indicia, to "rubber-stamp” counterfeiting when a valid indicium is scanned and reproduced on multiple mail pieces. To prevent such "rubber-stamp” counterfeiting, it is known to incorporate information from the address block of the mail piece into the postal indicium. Because space on an envelope is limited, typically only a small portion of the information in the address block will be incorporated into the indicium.
- prior art mailing system 10 includes address printer controller 12, address printer 14, postage meter 16, and indicia printer 20.
- Address printer controller 12 receives address information from a data processing system (not shown), generates a bitmap representative of the nominal, or "pristine", image of the address block, and controls address printer 12 to print address block A, representative of the address, on envelope E.
- Meter 16 receives postage information, and other information, from the data processing system.
- Meter 16 also receives characterizing information descriptive of block A from address printer controller 12.
- the information received can be either text-based or image-based. Text-based information is descriptive of the words or characters making up to the address, (e.g., ASCII code) while image-based information is descriptive of the actual printed image in the address block.
- Meter 16 combines the characterizing information with the postage value and other information, typically digitally signs the combination, generates a bitmap representative of an indicium including the digitally signed combination, and controls indicia printer 20 to print indicium IN on envelope E.
- the address block can be scanned again, and the information regenerated from the scanned address block compared to information recovered from indicium IN, without the need to communicate with the remote mailing system; thus tying indicium IN to the particular mail piece.
- printer 20 need not be a secure printer; but can be a general purpose printer which can be controlled by other devices for other uses.
- US 2001/0040979 A1 discloses that watermark and pattern detection can be improved by compensating for artifacts introduced into an image by a printer and/or scanner through which the image has passed.
- the image Prior to watermark or pattern detection, the image is filtered or modified to compensate for artifacts introduced by the printer and/or scanner.
- Some scanners automatically compensate for artifacts introduced by the scanner by using a calibrated tone map.
- the automatic compensation provides an image from which, a watermark can be easily read.
- the user is provided with an interface which can be used to change certain parameters such as contrast and intensity. The changes made by the user change the compensation (i.e. the tone map) applied to the image. If the user changes the compensation applied to the image it can affect the ability to read the watermark.
- a system which reverses any compensation introduced by the user so that the watermark or pattern can be more easily read.
- Another system takes into consideration that some printers and scanners have transfer functions which differ in the "x" and "y” directions.
- the compensation introduced by the filter can differ in the "x" and "y” directions.
- a scanner introduces aliasing frequencies into an image. Detection is improved by selectively removing certain frequencies.
- the filter compensates for fact that the scanner frequency response falls off at higher frequencies.
- US 2003/0053653 A1 discloses a watermark system including an embedder, detector, and reader.
- the watermark embedder encodes a watermark signal in a host signal to create a combined signal.
- the detector looks for the watermark signal in a potentially corrupted version of the combined signal, and computes its orientation.
- a reader extracts a message in the watermark signal from the combined signal using the orientation to approximate the original state of the combined signal.
- the watermark system applies to other electronic and physical media. For example, it can be applied to mark graphical models, blank paper, film and other substrates, texturing objects for ID purposes, etc.
- a method for generating characterizing information for a selected block of printed material (such as an address printed on an envelope or other mail piece),where said printed material is to be scanned from an object and compared with said characterizing information at a location distant from where said block is printed.
- the method comprises: a) printing said block on an object; b) applying each algorithm from a predetermined set of characterizing algorithms to a pristine image of said block of printed material to generate a plurality of corresponding first characterizing information descriptors for said block; c) determining estimates of robustness for each of said algorithms; and d) selecting, as a function of said estimates, a combination of descriptors generated by a corresponding combination of said algorithms as said characterizing information.
- the estimates are determined by: a) filtering a pristine digital image of said block of printed material with a print/scan filter to create a filtered image, said print/scan filter simulating the expected transformation of said pristine image by printing and scanning processes; b) applying each algorithm from said predetermined set of characterizing algorithms to said filtered image to generate a plurality of corresponding second characterizing information descriptors for said filtered digital image; and c) for each algorithm from said predetermined set of characterizing algorithms, comparing corresponding said first and said second descriptors to determine said estimates of robustness.
- the estimates are determined by: a) filtering a pristine digital image of said block of printed material with a print/scan filter to create a filtered image, said print/scan filter simulating the expected transformation of said pristine image by printing and scanning processes; b) further filtering said filtered image with one or more defacing filters, said defacing filters simulating simulate blots, smudges, failure of print elements or scanner sensors, or other, similar occasional events which can not easily be incorporated into said print/scan filter to create one or more defaced images; c) applying each algorithm from said predetermined set of characterizing algorithms to said filtered image and to said one or more defaced images to generate a plurality of corresponding second characterizing information descriptors for said filtered digital image and one or more pluralities of defaced image descriptors corresponding to each of said one or more defaced images; and d) for each algorithm from said predetermined set of characterizing algorithms, comparing corresponding first characterizing information descriptors with corresponding
- the selected descriptor is one of the second descriptors.
- an indicium including the characterizing information is verified by: a) scanning images of said indicium and said other printed material from said object; b) inputting a combination of first descriptors comprising the characterizing information from said indicium image; c) identifying characterizing algorithms used to generate said first descriptors; d) applying said identified algorithms to said image of said other material to generate second descriptors; e) comparing said first and second descriptors; and f) if said first and second descriptors do not match, diverting said object for further inspection.
- An embodiment of the present invention provides a robust and flexible method and system for characterizing particular text blocks.
- mailing system 22 includes address printer controller 13, address printer 14, postage meter 16, and indicia printer 20, which are substantially similar to the corresponding prior art elements shown in Figure 1.
- System 22 differs in including data stores 21 and 23 communicating with controller 13 and in the manner in which controller 13 generates characterizing information.
- Data store 21 stores a plurality of characterizing of characterizing algorithms, as will be described further below, and data store 23 stores at least a print/scan filter which, when applied to the pristine image generates a filtered image which approximates the transformation of the pristine image by the printing and scanning processes.
- data store 26 stores one or more defacing filters which simulate blots, smudges, failure of print elements or scanner sensors, or other, similar occasional events which can not easily be incorporated into said print/scan filter to create one or more defaced images.
- meter 16, printer 20, form secure postal indicia printing system 22.
- Figure 2 also shows verification controller 25, camera 27, data store 28, storing the characterizing of characterizing algorithms used in system 22, and diverter 29; which together comprise verification system 30 for comparing address block A with information recovered from indicium IN and diverting mail pieces which do not match, as described above.
- System 30 is typically located at a postal facility distant from system 22.
- operation of verification system 30 is substantially conventional and need not be described further here for an understanding of the subject embodiment.
- a characterizing algorithm where the characterizing information comprises measurements of the lengths of the individual words which make up address A is shown in Figure 3.
- Address block A is parsed to identify individual words by first identifying line spaces Is by determining the occurrence of large amounts of horizontal white space between blocks of printed text, and then identifying word spaces ws by determining the occurrence of large amounts of vertical white space between blocks of printed text (as shown with respect the first line of address A).
- Word lengths /1 through /9 are then determined for address A.
- word lengths are taken (measured in pixels) from the edges of word spaces ws (or the address edges) as shown, but can be taken in any convenient manner, such as along the midline of the words.
- the number of bits used can be selected to encode all words in the address, and two control bits will be sufficient to indicate selection of five to eight bits per word to encode the length of the word.
- a fixed number of words in the address for example the first eight, can be scanned at a fixed number of bits per word; eight in this case, since control bits would not be needed to specify the number of bits per word.
- the number of upwards (+) and downwards (-) outliers per word can be encoded as "xxx/yyy" where x and y are binary digits and xxx is the number of (+) outliers and yyy is the number of (-) outliers.
- the characterizing information comprises a description of the shape of the address block is shown in Figure 5.
- the shape is determined by using a conventional "best fit" scanning algorithm which encloses address block A with “best fit” closed curve 50.
- curve 50 is constrained. That is the manner in which a curve can be generated is limited so that the resulting curve is simplified and can be described with limited information.
- curve 50 is formed from linked straight line segments, such as segment 51, which are limited to eight "directions", up (U), down (D), left (L), right I, up-right (UR), up-left (UL), down-right (DR), and down-left, (DL); viewed as being generated starting in the upper left corner of address block A and traveling clockwise around address block A.
- the curve 50 also accounts for spaces between characters, words and lines, treating these spaces as equivalent to printed space, so that curve 50 does not become too convoluted and require extensive descriptive information. It is within the skill of a person skilled in the art to provide an algorithm which will generate robust and compact characterizing information, as described above.
- the characterizing information i.e.. the description of curve 50, can be encoded in a number of ways.
- the characterizing information consists of only the directions, without lengths, of each successive line segment.
- Bit streams such as those describe above comprise ordered sequences of values which are typically, though not necessarily, numeric values associated with words in the address block. (Such bit streams are hereinafter sometimes “characterizing information descriptors” or “descriptors” and such values are hereinafter sometimes “characterizations”.)
- characterizing information descriptors or “descriptors” and such values are hereinafter sometimes “characterizations”.
- characterizations As described above, when an indicium is validated, i.e., tied to the mail piece on which it is printed, at a distant postal facility the descriptor generated from the pristine image and incorporated into the indicium is compared with a descriptor recovered from an image scanned from the address block printed on the mail piece.
- the recovered image will be transformed with respect to the pristine image by the characteristics of the printing and scanning processes, as well as possibly by the occurrence of occasional events such as blots.
- the algorithm used to characterize the address block be robust; that is that it produces descriptors that match sufficiently when an indicium is valid, and do not match for invalid indicia, despite small differences between the scanned image and the pristine image.
- the robustness of a particular characterizing algorithm can vary for different address blocks. (As a hypothetical example, the above described algorithm based on word length may be less robust for address blocks printed in a small font while algorithms based on the number of outliers, or address block shape may be relatively insensitive to font size.)
- FIG. 6 shows a flow diagram of the operation of controller 13 in accordance with one embodiment of the subject invention.
- controller 13 obtains a pristine digital image, P, of address block A from a conventional source (not shown) such as a data processing system for preparing a bulk mailing.
- controller 13 carries out printing of address block A in a conventional manner. Preferably, this printing process is carried out concurrently with the selection of a characterizing algorithm but, in other embodiments of the subject invention, printing of address block A can be carried out sequentially or by a separate processor.
- controller 13 inputs a print/scan filter which simulates the printing process of printer 14 and the scanning process to be carried out at a remote postal facility from data store 26 and applies it to image P to generate a filtered image, F, which approximates the image which will be scanned from the mail piece at the postal facility.
- controller 13 sets index i equal to 1 and variable R equal to 0.
- the comparison at step 72 is carried out using a comparison algorithm associated with characterizing algorithm C l and which preferably is the same comparison algorithm used at the postal facility to compare the descriptor recovered from the scanned image with the descriptor incorporated into indicium IN.
- the comparison is carried out on a characterization by characterization basis, comparing each C l (P) j with the corresponding C l (F) j to determine if the characterizations match; i.e., if they are "close enough" as defined by the particular comparison algorithm used.
- characterizations are word lengths they may be considered to "match” if the lengths differ by no more than one or two units; while if the characterizations are the number of outliers in a word a "match” may require exact equality.
- this is carried out by a table look-up which determines whether or not COMB j is permitted.
- Such table can be up dated off-line in response to accumulated experience or heuristic experimentation.
- the rules might require that a particular descriptor be included in permitted combinations while prohibiting other particular sub-combinations of descriptors.
- each combination is logically tested against the rules to determine if the combination is permitted.
- controller 13 determines if the size of COMB j is small enough to fit in the available space in indicium IN. If so, then at step 102 controller 13 calculates OR j , the overall robustness of COMB j .
- OR j avg R a , R b , ... R y
- FIG. 8 shows a flow diagram of the operation of controller 13 in accordance with another embodiment of the subject invention. Similar to the above described embodiment, at step 90, controller 13 obtains pristine digital image, P, of address block A, at step 94 carries out printing of address block A concurrently with the selection of a characterizing algorithm and, at step 96 inputs a print/scan filter.
- controller 13 inputs defacing filters D 1 through D T (described above) and applies each of these filters to filtered image F to generate defaced images F*D 1 through F*D T which approximate scanned images of address blocks which have been defaced by occasional events such as blots.
- controller 13 sets index i equal to 1 and variable R equal to 0.
- controller 13 applies the ith characterizing algorithm C l to images P, F and F*D 1 through F*D T to generate corresponding descriptors C l (P), C i (F) and C i (F*D 1 ) through C l (F*D T ); each comprising a sequence of M characterizations, or values, C i (P) 1 through C i (P) M : C l (F) 1 through C i (F) M , etc.
- controller 13 compares descriptors C i (P) with descriptors C l (F) and C i (F*D 1 ) through C i (F*D T ) to estimate a robustness value R l for the ith algorithm C l , with respect to a particular image P.
- controller 13 stores C l (X) (where again X can be either P or F depending upon the embodiment) and R l .
- FIG. 9 shows a flow diagram of the operation of controller 13 in accordance with another embodiment of the subject invention in which estimates of the robustness of algorithms C i have been previously obtained and stored. Such estimates can be predetermined on the basis of experience with use or heuristic experimentation, or in any other convenient manner.
- controller 13 obtains pristine digital image, P. of address block A
- controller 13 applies algorithm C i to image P to generate descriptor C i (P).
- additional step 125 is carried out immediately after step 124 to generate filtered image F, and step 126a is substituted for step 126 to generate descriptor C i (F).
- controller 13 stores C i (X) (where again X can be either P or F depending upon the embodiment).
- FIG. 10 shows a flow diagram of the operation of verification system 30 in verifying indicium IN.
- controller 25 identifies algorithms C a , C b , ...C y from index value J, at step 146 calculates descriptors C a (SI), C b (SI), ...C y (SI), and at step 150 compares corresponding descriptors.
- controller 25 activates diverter 29 at step 154 to divert envelope E for inspection; and otherwise, at step 158 sends envelope E on for normal processing.
- the descriptors are determined not to match if any pair of characterizations do not match. That is if for any i,k the characterizations Ci(X)k, Ci(SI)k do not match then at step 152 no match is found.
- comparisons are made using comparison algorithms associated with each of characterizing algorithms Ci, and stores in data store 28.
- a predetermined threshold number of characterizations which fail to match is required before no overall match is found. In still other embodiments, this threshold may vary between 1 and another predetermined value or values associated with particular combinations j and stored in data store 28. In other embodiments threshold values are specified in indicium IN.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Image Processing (AREA)
- Character Discrimination (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Analysis (AREA)
Description
- The subject invention relates to the problem of providing a robust, compact characterization of a block of printed text which will distinguish the selected block of text from other such blocks. More particularly, it relates to the problem of providing an image-based characterization of a printed address block which can be incorporated into a digital postal indicium. (By "robust and compact" herein is meant information which is small enough in quantity to be incorporated into postal indicia yet will identify a text block, and distinguish it from other text blocks, with sufficient reliability to deter "rubber stamp" counterfeiting; despite errors introduced by the printing and/or scanning processes.)
- Postage metering systems account for postage and other values such as parcel delivery service charges and tax stamps, and print indicia representative of such values as proof of payment. To protect against counterfeiting of indicia, modern digital postage metering systems use encryption technology. The postage value and other information relating to an indicium, preferably, are digitally signed or otherwise cryptographically authenticated, and the information and signature are incorporated into the digital postal indicium.
- Digital postal indicia using encryption technologies are extremely secure. In general, without knowledge of the proper encryption keys, it is essentially impossible to produce a counterfeit digital indicium, However, digital indicia are subject, as are all postal indicia, to "rubber-stamp" counterfeiting when a valid indicium is scanned and reproduced on multiple mail pieces. To prevent such "rubber-stamp" counterfeiting, it is known to incorporate information from the address block of the mail piece into the postal indicium. Because space on an envelope is limited, typically only a small portion of the information in the address block will be incorporated into the indicium.
- In Figure 1, prior
art mailing system 10 includesaddress printer controller 12,address printer 14,postage meter 16, andindicia printer 20.Address printer controller 12 receives address information from a data processing system (not shown), generates a bitmap representative of the nominal, or "pristine", image of the address block, andcontrols address printer 12 to print address block A, representative of the address, onenvelope E. Meter 16 receives postage information, and other information, from the data processing system.Meter 16 also receives characterizing information descriptive of block A fromaddress printer controller 12. The information received can be either text-based or image-based. Text-based information is descriptive of the words or characters making up to the address, (e.g., ASCII code) while image-based information is descriptive of the actual printed image in the address block.Meter 16 combines the characterizing information with the postage value and other information, typically digitally signs the combination, generates a bitmap representative of an indicium including the digitally signed combination, andcontrols indicia printer 20 to print indicium IN on envelope E. When the mail piece is sent to a postal service location the address block can be scanned again, and the information regenerated from the scanned address block compared to information recovered from indicium IN, without the need to communicate with the remote mailing system; thus tying indicium IN to the particular mail piece. (Note that since indicium IN is cryptographically linked to the address on the mail piece,printer 20 need not be a secure printer; but can be a general purpose printer which can be controlled by other devices for other uses.) Commonly assigned, U.S. Patent application publication number2004/0128254 entitled System And Method For Mail Destination Address Information Encoding Protection And Recovery In Postal Payment in the name of Leon A. Pintsov discloses a system similar to that of the Figure 1 using text-based characterizations of the address block. - While useful for its intended purpose, problems remain with the system of Figure 1 and similar systems. It has proven difficult to reliably recover textual information from address blocks during the validation process using available optical character recognition (OCR) techniques. Attempts to increase the robustness of text-based systems by incorporation of additional information and/or the use of error correcting codes has resulted in undesirable increases in indicia size and computational complexity. Use of image-based characterizing systems, such as those described in the above mentioned co-pending application publication number
2004/0128254 has been proposed and is believed to substantially overcome some of the problems of text-based systems. However, to date, no characterizing algorithm is known to be sufficiently robust for all possible applications. This problem is exacerbated by the variation in robustness of characterizing algorithms with respect to the particular text block to be characterized. -
US 2001/0040979 A1 discloses that watermark and pattern detection can be improved by compensating for artifacts introduced into an image by a printer and/or scanner through which the image has passed. Prior to watermark or pattern detection, the image is filtered or modified to compensate for artifacts introduced by the printer and/or scanner. Some scanners automatically compensate for artifacts introduced by the scanner by using a calibrated tone map. The automatic compensation provides an image from which, a watermark can be easily read. However, generally the user is provided with an interface which can be used to change certain parameters such as contrast and intensity. The changes made by the user change the compensation (i.e. the tone map) applied to the image. If the user changes the compensation applied to the image it can affect the ability to read the watermark. A system is disclosed which reverses any compensation introduced by the user so that the watermark or pattern can be more easily read. Another system takes into consideration that some printers and scanners have transfer functions which differ in the "x" and "y" directions. Thus, the compensation introduced by the filter can differ in the "x" and "y" directions. In one system, a scanner introduces aliasing frequencies into an image. Detection is improved by selectively removing certain frequencies. In another system, the filter compensates for fact that the scanner frequency response falls off at higher frequencies. -
US 2003/0053653 A1 discloses a watermark system including an embedder, detector, and reader. The watermark embedder encodes a watermark signal in a host signal to create a combined signal. The detector looks for the watermark signal in a potentially corrupted version of the combined signal, and computes its orientation. Finally, a reader extracts a message in the watermark signal from the combined signal using the orientation to approximate the original state of the combined signal. While adapted for images, video and audio, the watermark system applies to other electronic and physical media. For example, it can be applied to mark graphical models, blank paper, film and other substrates, texturing objects for ID purposes, etc. - In accordance with the subject invention, there is provided a method for generating characterizing information for a selected block of printed material (such as an address printed on an envelope or other mail piece),where said printed material is to be scanned from an object and compared with said characterizing information at a location distant from where said block is printed. The method comprises: a) printing said block on an object; b) applying each algorithm from a predetermined set of characterizing algorithms to a pristine image of said block of printed material to generate a plurality of corresponding first characterizing information descriptors for said block; c) determining estimates of robustness for each of said algorithms; and d) selecting, as a function of said estimates, a combination of descriptors generated by a corresponding combination of said algorithms as said characterizing information.
- In an embodiment, the estimates are determined by: a) filtering a pristine digital image of said block of printed material with a print/scan filter to create a filtered image, said print/scan filter simulating the expected transformation of said pristine image by printing and scanning processes; b) applying each algorithm from said predetermined set of characterizing algorithms to said filtered image to generate a plurality of corresponding second characterizing information descriptors for said filtered digital image; and c) for each algorithm from said predetermined set of characterizing algorithms, comparing corresponding said first and said second descriptors to determine said estimates of robustness.
- In an embodiment, the estimates are determined by: a) filtering a pristine digital image of said block of printed material with a print/scan filter to create a filtered image, said print/scan filter simulating the expected transformation of said pristine image by printing and scanning processes; b) further filtering said filtered image with one or more defacing filters, said defacing filters simulating simulate blots, smudges, failure of print elements or scanner sensors, or other, similar occasional events which can not easily be incorporated into said print/scan filter to create one or more defaced images; c) applying each algorithm from said predetermined set of characterizing algorithms to said filtered image and to said one or more defaced images to generate a plurality of corresponding second characterizing information descriptors for said filtered digital image and one or more pluralities of defaced image descriptors corresponding to each of said one or more defaced images; and d) for each algorithm from said predetermined set of characterizing algorithms, comparing corresponding first characterizing information descriptors with corresponding second characterizing information descriptors and with each of said one or more corresponding defaced image descriptors to determine said estimates of robustness.
- In an embodiment, the selected descriptor is one of the second descriptors.
- In an embodiment, an indicium including the characterizing information is verified by: a) scanning images of said indicium and said other printed material from said object; b) inputting a combination of first descriptors comprising the characterizing information from said indicium image; c) identifying characterizing algorithms used to generate said first descriptors; d) applying said identified algorithms to said image of said other material to generate second descriptors; e) comparing said first and second descriptors; and f) if said first and second descriptors do not match, diverting said object for further inspection.
- An embodiment of the present invention provides a robust and flexible method and system for characterizing particular text blocks.
- Objects and advantages of embodiments will be apparent to those skilled in the art from consideration of the detailed description set forth below and the attached drawings.
- The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
- Figure 1 shows a schematic block diagram of a prior art mailing system.
- Figure 2 shows a schematic block diagram of a mailing system and a verification system in accordance with an embodiment.
- Figure 3 illustrates a method for abstracting characterizing information descriptive of an address block from an image of the address block.
- Figure 4 illustrates another method for abstracting characterizing information descriptive of an address block from an image of the address block.
- Figure 5 illustrates another method for abstracting characterizing information descriptive of an address block from an image of the address block.
- Figure 6 shows a flow diagram of the operation of the mailing system of Figure 2 in determining the robustness of algorithms for abstracting characterizing information in accordance with one embodiment of the subject invention.
- Figure 7 shows a flow diagram of the operation of the mailing system of Figure 2 in selecting a robust combination of descriptors.
- Figure 8 shows a flow diagram of the operation of the mailing system of Figure 2 in determining the robustness of algorithms for abstracting characterizing information in accordance with another embodiment of the subject invention.
- Figure 9 shows a flow diagram of the operation of the mailing system of Figure 2 in determining the robustness of algorithms for abstracting characterizing information in accordance with another embodiment of the subject invention.
- Figure 10 shows a flow diagram of the operation of the verification system of Figure 2 in verifying an indicium.
- In Figure 2,
mailing system 22 includesaddress printer controller 13,address printer 14,postage meter 16, andindicia printer 20, which are substantially similar to the corresponding prior art elements shown in Figure 1.System 22 differs in includingdata stores controller 13 and in the manner in whichcontroller 13 generates characterizing information.Data store 21 stores a plurality of characterizing of characterizing algorithms, as will be described further below, anddata store 23 stores at least a print/scan filter which, when applied to the pristine image generates a filtered image which approximates the transformation of the pristine image by the printing and scanning processes. In other embodiments,data store 26 stores one or more defacing filters which simulate blots, smudges, failure of print elements or scanner sensors, or other, similar occasional events which can not easily be incorporated into said print/scan filter to create one or more defaced images. Together,meter 16,printer 20, form secure postalindicia printing system 22. - Figure 2 also shows
verification controller 25,camera 27,data store 28, storing the characterizing of characterizing algorithms used insystem 22, anddiverter 29; which together compriseverification system 30 for comparing address block A with information recovered from indicium IN and diverting mail pieces which do not match, as described above. (System 30 is typically located at a postal facility distant fromsystem 22.) Except as to programming ofcontroller 25 to carry out the comparison algorithm of the subject embodiment, as will be described further below, operation ofverification system 30 is substantially conventional and need not be described further here for an understanding of the subject embodiment. - Three methods for generation of image-based characterizing information which are believed to provide improved compactness and robustness have recently been developed by the assignee of the present application and are described below as illustrative of the type of characterizing algorithms which can be used with the subject embodiment. Numerous other algorithms will be apparent to those skilled in the art and particular choices of algorithms to be used form no part of the subject invention, except as may be recited in the claims.
- A characterizing algorithm where the characterizing information comprises measurements of the lengths of the individual words which make up address A, is shown in Figure 3. Address block A is parsed to identify individual words by first identifying line spaces Is by determining the occurrence of large amounts of horizontal white space between blocks of printed text, and then identifying word spaces ws by determining the occurrence of large amounts of vertical white space between blocks of printed text (as shown with respect the first line of address A). Word lengths /1 through /9 are then determined for address A. Preferably, word lengths are taken (measured in pixels) from the edges of word spaces ws (or the address edges) as shown, but can be taken in any convenient manner, such as along the midline of the words.
- It is believed that using four or fewer bits per word would not be useful in postal applications. Thus, in a preferred embodiment, the number of bits used can be selected to encode all words in the address, and two control bits will be sufficient to indicate selection of five to eight bits per word to encode the length of the word. In other embodiments, a fixed number of words in the address, for example the first eight, can be scanned at a fixed number of bits per word; eight in this case, since control bits would not be needed to specify the number of bits per word.
- Another algorithm, where the characterizing information comprises measurements of the number of "outliers" in each word (or each line) which make up address A, is shown in Figure 4. (By "outliers" herein is meant ascenders or descenders and portions capitals of which project beyond thresholds, which are preferably determined by the upper and lower bounds of lower case letters without ascenders or descenders, such as "a", "c", "e", etc.) Address A is parsed to identify individual words, if necessary, by first identifying line spaces Is by determining the occurrence of large amounts of horizontal white space between blocks of printed text, and then identifying word spaces ws by determining the occurrence of large amounts of vertical white space between blocks of printed text (as shown with respect the first line of address A). Otherwise only the lines need be identified.
- Assuming six bits are allocated per word, the number of upwards (+) and downwards (-) outliers per word can be encoded as "xxx/yyy" where x and y are binary digits and xxx is the number of (+) outliers and yyy is the number of (-) outliers.
- Another algorithm in which the characterizing information comprises a description of the shape of the address block is shown in Figure 5. The shape is determined by using a conventional "best fit" scanning algorithm which encloses address block A with "best fit"
closed curve 50. (It should be understood that various algorithms for generating a best fit curve will generate different curves. These differences do not affect the subject embodiment so long as the same algorithm is used to generate the curve whose description is incorporated into the indicium and to recover the curve from the address block when the indicium is validated.) Preferably,curve 50 is constrained. That is the manner in which a curve can be generated is limited so that the resulting curve is simplified and can be described with limited information. In Figure 5,curve 50 is formed from linked straight line segments, such assegment 51, which are limited to eight "directions", up (U), down (D), left (L), right I, up-right (UR), up-left (UL), down-right (DR), and down-left, (DL); viewed as being generated starting in the upper left corner of address block A and traveling clockwise around address block A. Preferably thecurve 50 also accounts for spaces between characters, words and lines, treating these spaces as equivalent to printed space, so thatcurve 50 does not become too convoluted and require extensive descriptive information. It is within the skill of a person skilled in the art to provide an algorithm which will generate robust and compact characterizing information, as described above. - The characterizing information, i.e.. the description of
curve 50, can be encoded in a number of ways. In the present example, the characterizing information consists of only the directions, without lengths, of each successive line segment. - Programming of a data processor to analyze scan data to perform imaging operations such as identifying lines and words, measuring the dimensions of letters and words or fitting a curve to an image in accordance with predetermined constraints are well known. Such operations are substantially routine in the character and general pattern recognition arts, for example. Techniques for carrying out such operations are also taught in: Handbook of Pattern Recognition and Image Processing edited by T Young and K-S Fu, Academic Press, 1986 and need not be discussed further here for an understanding of the subject embodiment.
- Bit streams such as those describe above comprise ordered sequences of values which are typically, though not necessarily, numeric values associated with words in the address block. (Such bit streams are hereinafter sometimes "characterizing information descriptors" or "descriptors" and such values are hereinafter sometimes "characterizations".) As described above, when an indicium is validated, i.e., tied to the mail piece on which it is printed, at a distant postal facility the descriptor generated from the pristine image and incorporated into the indicium is compared with a descriptor recovered from an image scanned from the address block printed on the mail piece. It will be apparent to those skilled in the art that the recovered image will be transformed with respect to the pristine image by the characteristics of the printing and scanning processes, as well as possibly by the occurrence of occasional events such as blots. Thus, it is important that the algorithm used to characterize the address block be robust; that is that it produces descriptors that match sufficiently when an indicium is valid, and do not match for invalid indicia, despite small differences between the scanned image and the pristine image. It will also be apparent that the robustness of a particular characterizing algorithm can vary for different address blocks. (As a hypothetical example, the above described algorithm based on word length may be less robust for address blocks printed in a small font while algorithms based on the number of outliers, or address block shape may be relatively insensitive to font size.)
- Figure 6 shows a flow diagram of the operation of
controller 13 in accordance with one embodiment of the subject invention. Atstep 60,controller 13 obtains a pristine digital image, P, of address block A from a conventional source (not shown) such as a data processing system for preparing a bulk mailing. Atstep 62,controller 13 carries out printing of address block A in a conventional manner. Preferably, this printing process is carried out concurrently with the selection of a characterizing algorithm but, in other embodiments of the subject invention, printing of address block A can be carried out sequentially or by a separate processor. - At
step 64,controller 13 inputs a print/scan filter which simulates the printing process ofprinter 14 and the scanning process to be carried out at a remote postal facility fromdata store 26 and applies it to image P to generate a filtered image, F, which approximates the image which will be scanned from the mail piece at the postal facility. And atstep 66 sets index i equal to 1 and variable R equal to 0. - At
step 66controller 13 sets index i = 1 and variable R = 0, and atstep 70 applies the ith characterizing algorithm Ci to images P and F to generate corresponding descriptors Ci(P) and Ci(F); each comprising a sequence of M characterizations, or values, Ci(P)1 through Cl(P)M: Cl(F)1 through Cl(F)M. Then atstep 72,controller 13 compares descriptors Ci(P) and Cl(F) to estimate a robustness value Rl for the ith algorithm Ci, with respect to a particular image P. - The comparison at
step 72 is carried out using a comparison algorithm associated with characterizing algorithm Cl and which preferably is the same comparison algorithm used at the postal facility to compare the descriptor recovered from the scanned image with the descriptor incorporated into indicium IN. Preferably, the comparison is carried out on a characterization by characterization basis, comparing each Cl(P)j with the corresponding Cl(F)j to determine if the characterizations match; i.e., if they are "close enough" as defined by the particular comparison algorithm used. (As a hypothetical example, where the characterizations are word lengths they may be considered to "match" if the lengths differ by no more than one or two units; while if the characterizations are the number of outliers in a word a "match" may require exact equality.) - In a preferred embodiment, once descriptors Cl(P) and Cl(F) have been compared an estimate Ri for the robustness of algorithm Cl, with respect to particular image P, is calculated as:
where M is the number of characterizations generated by Cl. (Note that since robustness is defined with respect to small changes in the image, in normal use the filters, and the printing and scanning processes, will be such that the descriptors Ci(P) and Cl(F) will have the same number of characterizations. Otherwise an error condition is generated.) - Once estimate Rl is determined at
step 74,controller 13 stores Rl and Ci(X); where, in different embodiments of the subject invention, X can be P or F. That is, the descriptors incorporated into indicium IN can be based on either pristine image P or filtered image F. Then, atstep 78,controller 13 sets i = i+1 and, atstep 80 determines if i > N, where N is the number of algorithms to be evaluated. If so,controller 13 returns to step 66 to process the next algorithm; and otherwise goes to Figure 7. - In Figure 7, at
step 90controller 13 determines the size of all descriptors which have been generated, i.e. the number of bytes required to express each descriptor, and atstep 92 sets index j = 1 and variable OR = 0. - Then, at
step 94controller 13 tests the jth combination, COMBj = Ca(X), Cb(X), ...Cy(X) against predetermined rules. In a preferred embodiment, this is carried out by a table look-up which determines whether or not COMBj is permitted. Such table can be up dated off-line in response to accumulated experience or heuristic experimentation. As a hypothetical example, the rules might require that a particular descriptor be included in permitted combinations while prohibiting other particular sub-combinations of descriptors. In other embodiments, each combination is logically tested against the rules to determine if the combination is permitted. - Then at
step 96, if it is determined that COMBj is permitted, then atstep 100controller 13 determines if the size of COMBj is small enough to fit in the available space in indicium IN. If so, then atstep 102controller 13 calculates ORj, the overall robustness of COMBj. Preferably:step 106controller 13 determines if ORj > OR, and if so atstep 108, sets OR = ORj. - Then, or if the results at
steps step 110controller 13 sets j = j+1, and atstep 112 determines if j > 2N-1, that is if all combinations have been processed. If not,controller 13 returns to step 94 to process the next combination, and otherwise atstep 116 sends J and COMBJ tometer 16 for incorporation into indicium IN. The postal facility can then recover J to identify COMBJ and use COMBJ to validate indicium IN as will be described below. - Figure 8 shows a flow diagram of the operation of
controller 13 in accordance with another embodiment of the subject invention. Similar to the above described embodiment, atstep 90,controller 13 obtains pristine digital image, P, of address block A, atstep 94 carries out printing of address block A concurrently with the selection of a characterizing algorithm and, atstep 96 inputs a print/scan filter. - At
step 100controller 13 inputs defacing filters D1 through DT (described above) and applies each of these filters to filtered image F to generate defaced images F*D1 through F*DT which approximate scanned images of address blocks which have been defaced by occasional events such as blots. Atstep 102controller 13 sets index i equal to 1 and variable R equal to 0. - At
step 104controller 13 applies the ith characterizing algorithm Cl to images P, F and F*D1 through F*DT to generate corresponding descriptors Cl(P), Ci(F) and Ci(F*D1) through Cl(F*DT); each comprising a sequence of M characterizations, or values, Ci(P)1 through Ci(P)M: Cl(F)1 through Ci(F)M, etc. Then atstep 108,controller 13 compares descriptors Ci(P) with descriptors Cl(F) and Ci(F*D1) through Ci(F*DT) to estimate a robustness value Rl for the ith algorithm Cl, with respect to a particular image P. -
- Again similar to the embodiment described above, once estimate Rl is determined at
step 110controller 13 stores Cl(X) (where again X can be either P or F depending upon the embodiment) and Rl. Atstep 112,controller 13 sets i = i+1, and atstep 116 determines if i+1 is greater than N, the number of characterizing algorithms stored. If not,controller 13 returns to step 104 to test the next algorithm. Otherwise, atstep 120,controller 13 goes to Figure 7 and continues as described above. - Figure 9 shows a flow diagram of the operation of
controller 13 in accordance with another embodiment of the subject invention in which estimates of the robustness of algorithms Ci have been previously obtained and stored. Such estimates can be predetermined on the basis of experience with use or heuristic experimentation, or in any other convenient manner. Again, atstep 120controller 13 obtains pristine digital image, P. of address block A, atstep 122 carries out printing of address block A concurrently with the selection of a characterizing algorithm and, atstep 124 sets index i = 1. - In a preferred embodiment, at
step 126,controller 13 applies algorithm Ci to image P to generate descriptor Ci(P). In another embodiment,additional step 125 is carried out immediately afterstep 124 to generate filtered image F, andstep 126a is substituted forstep 126 to generate descriptor Ci(F). Atstep 130,controller 13 stores Ci(X) (where again X can be either P or F depending upon the embodiment). Atstep 132controller 13 sets i=i+1 and atstep 136 determines if i+1 is greater than N, the number of characterizing algorithms stored. If not,controller 13 returns to step 126 (or 126a depending upon the embodiment) to test the next algorithm. Otherwise, atstep 136,controller 13 goes to Figure 7 and continues as described above. - It is anticipated that other estimates for robustness of characterizing algorithms will be developed as experience with different applications is gained or will be apparent to those skilled in the art. Accordingly, it should be understood that, except for particular recitations in the claims below, details of particular estimates used form no part of the subject invention.
- Figure 10 shows a flow diagram of the operation of
verification system 30 in verifying indicium IN. After envelope E is scanned bycamera 27, atstep 140verification controller 125 inputs a digital scanned image SI of address block A, and atstep 142 inputs COMBJ = Ca(X), Cb(X), ...Cy(X) and index value J. Atstep 144controller 25 identifies algorithms Ca, Cb, ...Cy from index value J, atstep 146 calculates descriptors Ca(SI), Cb(SI), ...Cy(SI), and atstep 150 compares corresponding descriptors. Atstep 152, if the descriptors do not matchcontroller 25 activates diverter 29 atstep 154 to divert envelope E for inspection; and otherwise, atstep 158 sends envelope E on for normal processing. - At
step 150, in a preferred embodiment, the descriptors are determined not to match if any pair of characterizations do not match. That is if for any i,k the characterizations Ci(X)k, Ci(SI)k do not match then atstep 152 no match is found. Preferably comparisons are made using comparison algorithms associated with each of characterizing algorithms Ci, and stores indata store 28. In other embodiments, a predetermined threshold number of characterizations which fail to match is required before no overall match is found. In still other embodiments, this threshold may vary between 1 and another predetermined value or values associated with particular combinations j and stored indata store 28. In other embodiments threshold values are specified in indicium IN. - The embodiments described above and illustrated in the attached drawings have been given by way of example and illustration only. From the teachings of the present application those skilled in the art will readily recognize numerous other embodiments in accordance with the present invention. Accordingly, limitations on the present invention are to be found only in the claims set forth below.
Claims (10)
- A method for generating characterizing information for a selected block of printed material, where said printed material is to be scanned from an object and compared with said characterizing information at a location distant from where said block is printed, said method comprising the steps of:a) printing said block on an object;b) applying each algorithm from a predetermined set of characterizing algorithms to a pristine image of said block of printed material to generate a plurality of corresponding first characterizing information descriptors for said block;c) determining estimates of robustness for each of said algorithms; andd) selecting, as a function of said estimates, a combination of descriptors generated by a corresponding combination of said algorithms as said characterizing information.
- A method as described in claim 1 where said step c) comprises the sub-steps of:c1) filtering said pristine digital image of said block of printed material with a print/scan filter to create a filtered image, said print/scan filter simulating the expected transformation of said pristine image by printing and scanning processes;c2) applying each algorithm from said predetermined set of characterizing algorithms to said filtered image to generate a plurality of corresponding second characterizing information descriptors for said filtered digital image; andc3) for each algorithm from said predetermined set of characterizing algorithms, comparing corresponding said first and said second descriptors to determine said estimates of robustness.
- A method as described in claim 1 where said step c) comprises the sub-steps of:c1) filtering said pristine digital image of said block of printed material with a print/scan filter to create a filtered image, said print/scan filter simulating the expected transformation of said pristine image by printing and scanning processes;c2) further filtering said filtered image with one or more defacing filters, said defacing filters simulating simulate blots, smudges, failure of print elements or scanner sensors, or other, similar occasional events which can not easily be incorporated into said print/scan filter to create one or more defaced images;c3) applying each algorithm from said predetermined set of characterizing algorithms to said filtered image and to said one or more defaced images to generate a plurality of corresponding second characterizing information descriptors for said filtered digital image and one or more pluralities of defaced image descriptors corresponding to each of said one or more defaced images; andc4) for each algorithm from said predetermined set of characterizing algorithms, comparing corresponding first characterizing information descriptors with corresponding second characterizing information descriptors and with each of said one or more corresponding defaced image descriptors to determine said estimates of robustness.
- A method as described in claim 2 or claim 3 where said selected combination of descriptors comprises said second descriptors.
- A method as described in claim 1 where said estimates are predetermined and stored for said algorithms.
- A method as described in claim 1 where said object is a mail piece and said block of printed material represents an address.
- A method as described in claim 6 where said selected combination of descriptors is comprised in an indicium printed on said mail piece; whereby said selected combination can be recovered from said indicium for use at said remote location.
- A method as described in claim 7 where said indicium further comprises information identifying said combination.
- A method as described in claim 1 where selection of said combination is further based upon said descriptors' sizes.
- A method as described in claim 1 where selection of said combination is further based upon predetermined rules.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/736,077 US20050131840A1 (en) | 2003-12-15 | 2003-12-15 | Method and system for generating characterizing information descriptive of selected printed material such as a particular address block |
US736077 | 2003-12-15 |
Publications (3)
Publication Number | Publication Date |
---|---|
EP1544790A2 EP1544790A2 (en) | 2005-06-22 |
EP1544790A3 EP1544790A3 (en) | 2006-05-10 |
EP1544790B1 true EP1544790B1 (en) | 2007-09-12 |
Family
ID=34523112
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04029701A Expired - Fee Related EP1544790B1 (en) | 2003-12-15 | 2004-12-15 | Method and system for generating characterizing information descriptive of a selected text block |
Country Status (3)
Country | Link |
---|---|
US (1) | US20050131840A1 (en) |
EP (1) | EP1544790B1 (en) |
DE (1) | DE602004008866T2 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005059753A1 (en) * | 2003-12-15 | 2005-06-30 | Pitney Bowes Inc. | Method for mail address block image information encoding, protection and recovery in postal payment applications |
US7668786B2 (en) * | 2003-12-15 | 2010-02-23 | Pitney Bowes Inc. | Method and system for estimating the robustness of algorithms for generating characterizing information descriptive of selected printed material such as a particular address block |
US8005764B2 (en) * | 2004-12-08 | 2011-08-23 | Lockheed Martin Corporation | Automatic verification of postal indicia products |
US7937332B2 (en) * | 2004-12-08 | 2011-05-03 | Lockheed Martin Corporation | Automatic verification of postal indicia products |
US8209267B2 (en) * | 2004-12-08 | 2012-06-26 | Lockheed Martin Corporation | Automatic revenue protection and adjustment of postal indicia products |
DE102005040689A1 (en) * | 2005-08-26 | 2007-03-01 | Siemens Ag | Method for identifying postal items |
US8085980B2 (en) * | 2008-08-13 | 2011-12-27 | Lockheed Martin Corporation | Mail piece identification using bin independent attributes |
US20100100233A1 (en) * | 2008-10-22 | 2010-04-22 | Lockheed Martin Corporation | Universal intelligent postal identification code |
US8379801B2 (en) | 2009-11-24 | 2013-02-19 | Sorenson Communications, Inc. | Methods and systems related to text caption error correction |
US11562731B2 (en) | 2020-08-19 | 2023-01-24 | Sorenson Ip Holdings, Llc | Word replacement in transcriptions |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3978457A (en) * | 1974-12-23 | 1976-08-31 | Pitney-Bowes, Inc. | Microcomputerized electronic postage meter system |
US4168533A (en) * | 1976-01-14 | 1979-09-18 | Pitney-Bowes, Inc. | Microcomputerized miniature postage meter |
US4222518A (en) * | 1978-10-19 | 1980-09-16 | Simjian Luther G | Metering system |
US4226360A (en) * | 1978-12-19 | 1980-10-07 | Simjian Luther G | Metering system |
US4301507A (en) * | 1979-10-30 | 1981-11-17 | Pitney Bowes Inc. | Electronic postage meter having plural computing systems |
US4629871A (en) * | 1979-12-28 | 1986-12-16 | Pitney Bowes, Inc. | Electronic postage meter system settable by means of a remotely generated input device |
US4579054A (en) * | 1982-12-08 | 1986-04-01 | Pitney Bowes Inc. | Stand-alone electronic mailing machine |
US4493252A (en) * | 1983-03-09 | 1985-01-15 | Pitney Bowes Inc. | Postage printing apparatus having a movable print head in a print drum |
US4757537A (en) * | 1985-04-17 | 1988-07-12 | Pitney Bowes Inc. | System for detecting unaccounted for printing in a value printing system |
US4831555A (en) * | 1985-08-06 | 1989-05-16 | Pitney Bowes Inc. | Unsecured postage applying system |
US4725718A (en) * | 1985-08-06 | 1988-02-16 | Pitney Bowes Inc. | Postage and mailing information applying system |
GB2173738B (en) * | 1985-04-19 | 1989-07-12 | Roneo Alcatel Ltd | Secure transport of information between electronic stations |
US4900903A (en) * | 1986-11-26 | 1990-02-13 | Wright Technologies, L.P. | Automated transaction system with insertable cards for transferring account data |
US4873645A (en) * | 1987-12-18 | 1989-10-10 | Pitney Bowes, Inc. | Secure postage dispensing system |
US5448641A (en) * | 1993-10-08 | 1995-09-05 | Pitney Bowes Inc. | Postal rating system with verifiable integrity |
US6614914B1 (en) * | 1995-05-08 | 2003-09-02 | Digimarc Corporation | Watermark embedder and reader |
US5454038A (en) * | 1993-12-06 | 1995-09-26 | Pitney Bowes Inc. | Electronic data interchange postage evidencing system |
US5805747A (en) * | 1994-10-04 | 1998-09-08 | Science Applications International Corporation | Apparatus and method for OCR character and confidence determination using multiple OCR devices |
US5625694A (en) * | 1995-12-19 | 1997-04-29 | Pitney Bowes Inc. | Method of inhibiting token generation in an open metering system |
TW309026U (en) * | 1996-12-27 | 1997-06-21 | Kaulin Mfg Co Ltd | Adjustable fan-swinging structure |
US6344906B1 (en) * | 1997-09-16 | 2002-02-05 | Cyberscan Technology, Inc. | Universal document scanner controller |
US6584214B1 (en) * | 1999-04-23 | 2003-06-24 | Massachusetts Institute Of Technology | Identification and verification using complex, three-dimensional structural features |
US20010040979A1 (en) * | 1999-12-31 | 2001-11-15 | Clay Davidson | Compensating for color response and transfer function of scanner and/or printer when reading a digital watermark |
US7831518B2 (en) * | 2001-11-20 | 2010-11-09 | Psi Systems, Inc. | Systems and methods for detecting postage fraud using an indexed lookup procedure |
US7668786B2 (en) * | 2003-12-15 | 2010-02-23 | Pitney Bowes Inc. | Method and system for estimating the robustness of algorithms for generating characterizing information descriptive of selected printed material such as a particular address block |
-
2003
- 2003-12-15 US US10/736,077 patent/US20050131840A1/en not_active Abandoned
-
2004
- 2004-12-15 DE DE602004008866T patent/DE602004008866T2/en active Active
- 2004-12-15 EP EP04029701A patent/EP1544790B1/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US20050131840A1 (en) | 2005-06-16 |
EP1544790A3 (en) | 2006-05-10 |
EP1544790A2 (en) | 2005-06-22 |
DE602004008866T2 (en) | 2008-06-19 |
DE602004008866D1 (en) | 2007-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1672593B1 (en) | Method and system for printing an original image and for determining if a printed image is an original or has been altered | |
KR100433590B1 (en) | Ticket issuing method, ticket issuing system and ticket collating method | |
CA2265326C (en) | Unique identifier bar code on stamps and apparatus and method for monitoring stamp usage with identifier bar codes | |
US20060210138A1 (en) | Verification of authenticity of check data | |
US5170044A (en) | Error tolerant 3x3 bit-map coding of binary data and method of decoding | |
EP1791083A2 (en) | Method and system for encoding information into a bar code with different module size | |
US20070136213A1 (en) | Inline system to detect and show proof of indicia fraud | |
WO2003081432A1 (en) | Method for utilizing a fragile watermark for enhanced security | |
EP1544790B1 (en) | Method and system for generating characterizing information descriptive of a selected text block | |
JP2004127297A (en) | Bar code having extended visibility, system and method thereof | |
WO1994019770A1 (en) | Secure personal identification instrument and method for creating same | |
US6266680B1 (en) | Method for electronically checking authenticity of document | |
US6058190A (en) | Method and system for automatic recognition of digital indicia images deliberately distorted to be non readable | |
US7446891B2 (en) | Fragile watermark for detecting printed image copies | |
US7849317B2 (en) | Method for mail address block image information encoding, protection and recovery in postal payment applications | |
EP1533757B1 (en) | Method and system for generating postal indicia or the like | |
EP1544791B1 (en) | Method and system for estimating the robustness of algorithms for generating characterizing information descriptive of a selected text block | |
US20080292136A1 (en) | Data Processing System And Method | |
EP1533758B1 (en) | Method and system for generating characterizing information descriptive of printed material such as address blocks and generating postal indicia or the like incorporating such characterizing information | |
US20040123100A1 (en) | Certificate issuing method and certificate verifying method | |
US7424458B2 (en) | Method and system for generating characterizing information descriptive of printed material such as address blocks and generating postal indicia or the like incorporating such characterizing information | |
US20020063903A1 (en) | Method for checking the use of a system for transmitting information submitted in the form of matrix codes | |
US7617173B2 (en) | Method and system for improving security of postage indicia utilizing resolution and pixel size | |
JP4297040B2 (en) | Electronic watermarked document handling apparatus, electronic watermarked document handling system, and electronic watermarked document handling method | |
CA2124725A1 (en) | Mail processing system including off-line verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR LV MK YU |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR LV MK YU |
|
17P | Request for examination filed |
Effective date: 20061016 |
|
17Q | First examination report despatched |
Effective date: 20061215 |
|
AKX | Designation fees paid |
Designated state(s): DE FR GB |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FR GB |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 602004008866 Country of ref document: DE Date of ref document: 20071025 Kind code of ref document: P |
|
ET | Fr: translation filed | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20080613 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 12 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 13 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20161228 Year of fee payment: 13 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20161227 Year of fee payment: 13 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20161229 Year of fee payment: 13 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602004008866 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20171215 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20180831 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180703 Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180102 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20171215 |